Table of Contents
- Common Web Applications and Architectures
- Guidelines for Preparation and Testing
- Stalking Prey Through Target Recon
- Scanning for Vulnerabilities with Arachni
- Proxy Operations with OWASP ZAP and Burp Suite
- Infiltrating Sessions via Cross-Site Scripting
- Injection and Overflow Testing
- Exploiting Trust Through Cryptography Testing
- Stress Testing Authentication and Session Management
- Launching Client-Side Attacks
- Breaking the Application Logic
- Educating the Customer and Finishing Up

